All Episodes
She Said Privacy/He Said Security — 255 episodes
Advancing AI Fluency With Grit and Growth Mindset
Why Every Company Needs a Trust Center
Behind the Curtain With Tom Kemp: New CCPA Rules, Enforcements, and What's Next
Governing AI and Privacy Without Becoming the Bottleneck
Optimizing Privacy, Cybersecurity, and AI Governance for Growth
How Safe Are Kids' GPS Trackers and Smartwatches?
From Manual to Automated: Building Privacy Programs That Scale
Why Knowing Company Data is Every General Counsel's First Privacy Move
So You Got the Privacy Officer Title, Now What?
Where Policymaking Meets Privacy and AI Innovation
Hands-On AI Skills Every Legal Team Needs
Adapting Cybersecurity Measures for the Age of AI
The Path to Restoring Trust in a Connected World
AI, Privacy, and the General Counsel's Role in Responsible Innovation
Accelerating AI Adoption Through AI Week
How AI Is Transforming the General Counsel Role
Why Security Awareness Training Matters
GPC and UOOMS: Do Consumers Want an On/Off Switch or a Dimmer?
Navigating the New Rules of Healthcare Advertising
How Companies Can Prevent Identity-Based Attacks
New CCPA Rules: What Businesses Need to Know
How AI Is Rewriting the Rules of Cybersecurity
The Blueprint for a Global Privacy and Security Program
Navigating Privacy Compliance When AI Changes Everything
How Privacy is Reshaping the Ad Tech Industry
How to Build a Global Privacy Program That Enables Growth
Helping Seniors Avoid Digital Scams, One Click at a Time
Real AI Risks No One Wants To Talk About And What Companies Can Do About Them
Privacy in the Loop: Why Human Training Is AI's Greatest Weakness and Strength
Where Strategy Meets Reality in AI Governance
Endpoints-on-Wheels: Protecting Company and Employee Data in Cars
Agentic AI for Software Security: Eliminate More Vulnerabilities, Triage Less
Operationalizing Privacy Across Teams, Tools, and Tech
Outsmarting Threats: How AI is Changing the Cyber Game
Privacy Reform Is Coming to Australia: What Businesses Need To Know
Terms, Tech & Trust: A Privacy Deep Dive With Harvey AI
Silent Threats Lurking in Your Child's Devices and How To Avoid Them
Improving Cyber Readiness: Lessons from Real-World Investigations
Top Takeaways From IAPP GPS 2025 and Atlanta AI Week
From Principle to Practice: What Privacy Pros Need to Succeed
Making Privacy Tech Work: Why Process is the Game-Changer
Reimagining How Companies Share Data
How AI Is Revolutionizing Contract Reviews for Legal Teams
Inside Cybersecurity: How Hackers Think and How To Stop Them
Solving Privacy and Security Challenges in Healthcare Data Collaboration
ISACA 2025 State of Privacy Survey Findings
Is Privacy Dead or Are We Redefining It?
Proactive Approaches to Cyber Risk Management
The Leadership Edge: Why Coaching Matters for Privacy Pros
Navigating CIPA Claims: Strategies for Protecting Your Business
Data Enablement & Responsible AI in Regulated Industries: Transforming Compliance Into Innovation
Outsmarting Deepfakes: A New Era of Identity Verification
Health Data, Privacy, and Ethical Marketing: What Companies Need To Know
Integrating Privacy Across Healthcare, Retail, and Business Operations
Developing Resilient Cybersecurity Strategies for Businesses
Privacy as a Business Driver: How To Build Effective Programs
Your Data, Your Rules: How Cloaked Puts You in Control of Privacy and Security
From McPrivacy to Mastery: A Collaborative Approach To Building Strategic Privacy Programs
Mothers Against Cyber Crime: Tackling Cyber Threats at Home
Privacy Risk Assessments: Aligning Business With Compliance
How Secure is Your Health Data and Why Does it Matter?
Integrating Privacy Into Business Operations: A Cross-Collaborative Approach
Insights from IANS CISO Compensation and Budget Survey
How Grammarly Embeds Trust and Transparency Into Its Privacy, Security, and AI Programs
Navigating Digital Entropy: Insights from IAPP's Organizational Digital Governance Report
How To Stay Privacy-Conscious in the Evolving AdTech World
A CISO's Guide To Using AI in Governance, Risk, & Compliance Programs
Crafting a Cutting-Edge AI Governance Program: A Must-Know Guide for Businesses
The Future of Ad Tech: Privacy-Savvy Strategies for Businesses
From Codes to Security by Design: Navigating Software Cybersecurity
State Privacy Laws Are Shifting: What Businesses Need to Know
Beyond AI Governance: Building a Program for the Future
Data Resilience: The Key to Surviving Security Breaches
Cyber Insurance Missteps: What Companies Are Getting Wrong
From Data Collection to Consumer Trust: How Retailers Adapt to Evolving Privacy and Security Laws
Merging Marketing and Privacy to Create Sustainable Consent Solutions
AI, Privacy, and Innovation: Navigating Global Regulatory Challenges
Privacy vs. Profit: Inside the Ad Tech Ecosystem
AI Predators and Digital Dangers: Keeping Children Safe Online
Innovation, Security, and Privacy: A CIO's Playbook for Operational Success
Operationalizing Privacy: A Blueprint for Success
Revolutionizing Privacy: Automation, AI, and OneTrust's Innovative Approach
Maintaining Compliance With SEC Cyber Rules and Security Regulations
Compliance in the Modern Age: Building Effective Privacy Programs With Gretchen Herault
Privacy and Security Defenses for Cloud Software With Michael Moore
AdTech Confidential: Mastering Vendor Due Diligence and Privacy with Richy Glassberg
Offensive Cybersecurity Strategies with Bryson Bort
The CISO and The SEC Cyber Regulations and Their Impact on Privacy and Security
Strategies for Privacy Professionals in the Boardroom With Judy Titera
Pixel Litigation, Ad Tech, and Digital Advertising Privacy With Alysa Hutnik
Building Privacy Programs for Global Businesses
Measuring Cybersecurity and Privacy With a Scorecard With Owen Denby
Privacy and Security Concerns in Data Retention With Bill Piwonka
Protecting Children's Privacy in the Social Media Age With Titania Jordan
The Essentials of Privacy Engineering With Jay Averitt
U.S. Privacy Law Models Across the States With Keir Lamont
New Technologies and Navigating Privacy Risk With Joe Toscano
Selecting and Leveraging Privacy Software and Generative AI's Impact on Privacy With Ben Brook
Best Tips for Privacy Experts To Elevate Their Practice With Jamal Ahmed
Expert Negotiation Tips When Your IT Network Is Held Hostage
How Levi's Values Influences its Privacy Program With Karen McGee
Breaking Down the Washington State My Health, My Data Act With Mike Hintze
Updates and Changes in US State Privacy Laws for 2024 With Andrew Kingman
Navigating Privacy Landscapes: US State Privacy Laws, UK Data Protection, and Cross-Border Transfers
Decoding Quebec's Law 25: What Companies Need To Know With Sharon Bauer
The Paradigm of Adtech Privacy: Using Data Clean Rooms and Opt-In/Opt-Outs To Achieve Compliance
How Reliance on AI Technologies Places Smaller Businesses at Risk of Ransomware Attacks With Taylor Hersom
Privacy Lawyer Jennifer Mitchell on Employee Data Privacy Under the California Consumer Privacy Act
Why Companies Should Outsource CISO Services and How the Role Intersects With Privacy Duties
How Smaller Companies Can Mitigate Cybersecurity Risks and Comply With the New SEC Rules
ZoomInfo's Al Raymond on B2B Privacy Programs and Third-Party Privacy Risk Management
HP's Aaron Weller on Privacy Engineering, PETs, and Information Security
How Cyber Services Can Heed the New SEC Regulations to Address Privacy and Security Concerns
Meta, AI, and the New Privacy Laws: What You Need to Know
Privacy Regulations, Privacy by Design, and AI: Creating Engaging Apps While Remaining Compliant
Best Practices for Mitigating Cybersecurity and Blockchain Risks With Roderic Deichler
Mark Webber on Law Firms Implementing AI and Complying with the US-EU Data Privacy Framework
The Future of Identity With Riley Hughes
Tim Lupinacci on Leadership and Why Cybersecurity Is Essential for Law Firms
Integrating Data Privacy Into Customer Data Platforms With Julian Llorente Perdigones of Tealium
Privacy AI: The Future of Building Smart Privacy Programs
How a Global Brand Can Build a Privacy Program With Eduardo Ortiz of Carnival Cruise Line
How To Talk to Your Kids About the Dangers of Social Media With Officer David Gomez
Chief Privacy Officer Jason Sarfati Explains Everything You Need To Know About Location Data Privacy
Rohan Massey Provides a Deep Dive on Data Privacy Framework & Cross Borders
Protecting Consumer Data Using Secret Shopper Safeguards With Boltive CEO Dan Frechtling
Gaining Customer Business by Providing Trustworthy Data Software With Ed Britan of Salesforce
The Far-Reaching Risks of the Emerging Framework for AI Deployment With Jim Dempsey
AI Governance and Responsible AI With Dr. Emre Kazim
Cybersecurity, Risks, and Why Your Company Needs a vCISO With New Oceans Enterprises Donna Gallaher
A Conversation About the California Delete Act and Future of AI With Investor and Author Tom Kemp
Where Privacy and Security Overlap
Compliance Scalability: Tips and Tools From RadarFirst CEO Don India
Jodi and Justin's Top 5 Must-Haves in Your Company's AI Policy
Mitigating Security Breaches Through Distributed Data Command and Control
The Upsurge in Ransomware and Voice Phishing: How Managed Security Services Can Help
AI and Privacy: A Future of Privacy Forum Conversation
Privacy Laws and Ad Tech: A Deep Dive on Compliance
ChatGPT and AI: Crucial Considerations for Businesses
The Future of Privacy: Insights From a General Counsel
Leveraging Privacy SaaS Platforms To Boost Compliance
The Rise of Website Pixel Class Action Lawsuits
Data Transformation Strategies to Comply With Privacy Regulations
US Federal Privacy Regulations: Updates and Factors Influencing its Development
Canada vs. US Privacy Law – What Companies Need to Know
Establishing Consent With Loyalty Programs
What You Should Know About Ransomware and Developing Incident Response Plans
Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings
Building Privacy Programs in the Evolving Ad Tech Space
How To Protect Backup Servers From Ransomware Attacks
Hiring and Staffing in the Privacy and Security Space
Blockchain: The Road to Adoption
Protecting Consumer Data From Third Parties
Building Privacy Programs for Software Engineers
Assessing and Preventing Financial Risks
Know Your Data: How To Manage and Secure Regulated Company Data
Proactive Incident Response Measures for Cyber Attacks
Blockchain: Concerns, Considerations, and Regulations
Deconstructing Privacy and Consent in Digital Marketing and Ad Tech
The Importance of a Strategic Privacy Program
Understanding Privacy and Security Regulations in the Ad Tech Space
Emphasizing Data Privacy and Security: Insights From Jodi and Justin Daniels
Smart Technology: A Privacy and Security Perspective
The Future of Data Privacy in the U.S.
Automating Data Privacy
The Importance of Privacy and Security in Product Design
Addressing Children's Privacy Concerns on the Internet
Privacy Protection From Online Harassment and Job Security Threats
Understanding Drone Privacy and Security Regulations
Red Teaming for Security Exploits
Cybersecurity Education: Best Practices
Privacy Compliance in a Post-Cookies World
Regulating Air Traffic for Drone Use
Reinstating Control With Digital Identity
Implementing Virtualization for Safe and Efficient Software Testing
Developing Security Programs to Mitigate Cyber Attacks
Building Privacy Programs for Your Organization
Implementing a Secure Identity and Access Management Program
Maintaining Data Security With SDKC
Transforming How Your Children Use Technology
Jodi and Justin's Top Five Privacy and Security Lessons for 2022
Training Your Company on Privacy and Security Laws
Data Privacy in the Evolving Advertising Landscape
Building a Balanced Privacy Program
Data Collaboration and the Future of Data Privacy
How Security Plans Impact Business Transactions
Privacy, Security, and Drones
Keeping Your Kids Safe in the Digital World
Building a Privacy and Security Strategy for the Cloud
Evolving Privacy Laws
What is Communication's Impact on Your Security and Privacy Program?
Private Cyber 911
Privacy and Security Precautions for the Cloud
The Future of Online Identity Verification
Privacy by Design
Closing the Security Gap For IoT Devices
Building Trust Through Data Transparency
Using AI for Data Breach Response
Securing the Cloud with Identity and Access Management
How Can Hackers Improve Your Company's Security?
Protecting Your Data One Drive at a Time
Ethical Privacy Practices for Businesses
Building Trust With Privacy Compliance
Outsmarting a "Smart" World
The Ins and Outs of Ransom Negotiation
The Trifecta of Vendor Due Diligence With Caroline McCaffery
Strategies for Disrupting Cybercrime Threats in the Corporate World
Revolutionizing Cybersecurity Training
Using AI to Protect Children Online
Building Atlanta Into a Cybersecurity Empire
Planning Ahead for a Public Relations Crisis
Cybersecurity: The 21st Century Digital Seatbelt
The Future of Shared Breach and Security Data
The Truth About Election Security With the General Counsel for the Georgia Secretary of State
Jodi & Justin's Top 5 Privacy & Security Trends 2021
Cybersecurity, the Cloud, and Your Company: Everything You Need to Know
The Intersection of Crisis Response and Privacy and Security Infrastructure
Creating Safe Spaces to Protect Your Children from Online Harm
Be Prepared Now — Not Sorry Later
Avoiding Ransomware Attacks in Businesses of All Sizes
Everything You Need to Know About Your Child's Online Safety
Building a Privacy and Security-Savvy Workplace Culture
Keeping Up With Current Privacy and Security Regulations
Privacy, Security, and Artificially Intelligent Drones
Data Erasure: A 21st Century Necessity
Prioritizing Basic Privacy and Security Controls
The Importance of Modernizing Your Company's Privacy and Security Legacy Systems
Protecting Your Nonprofit's Privacy and Security
A Day in the Life of a Chief Privacy Officer
How to Make Privacy and Security Training Memorable and Enjoyable for Your Employees
Cybersecurity: It's Not an IT Problem, It's a Business Problem
Why IP Laws Are Your Company's Best Friend
How CFOs Impact Privacy and Security
Building Effective IT Infrastructure for Your Business
A Handy Guide to Cyber Insurance Coverage
What Your Company Needs to Know about Identity and Access Management
How Your Company Can Avoid Phishing, Ransomware, and Other Privacy and Security Breaches
How Small and Large Organizations Can Identify and Prevent Common Privacy and Security Issues
The Truth About Drones and Your Data
Helping Tech-Savvy Children Understand The Importance of Security and Privacy
How Your Company Can Identify and Mitigate Dangerous Cybersecurity Risks
The Regulation Dilemma: How Can We Standardize Privacy and Security?
What Marketers and Consumers Need to Know About Privacy, Security, and Cookieless Advertising
Avoiding Common Cybersecurity Threats and Protecting Your Data
Smart Cities: The Privacy Concerns We Should All Be Aware Of
What Every Parent Needs to Know About The Social Dilemma and The Great Hack
Navigating the Cybersecurity Maturity Model Certification (CMMC)
Are You Really Doing Enough to Ensure Your Company's Privacy and Security?
What Companies Need to Know About Third-Party Vendor Security and Privacy Issues
Cybersecurity and Privacy Lessons from a 'Smart City Testing Lab' for Future Cities
Insights Into Cybersecurity and Protecting Your Business with Mark Sangster
Investigating Cyber Crimes with United States Secret Service Special Agent, Marc Debrody
Identifying Cybersecurity Risks with Former FBI Special Agent, Michael F. D. Anaya
Privacy Notices: Everything You Need to Know
Marketing & Privacy 101